Sciweavers

3149 search results - page 72 / 630
» IT security risk management
Sort
View
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
SOCIALCOM
2010
13 years 6 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
ISW
1997
Springer
14 years 1 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
MANSCI
2007
86views more  MANSCI 2007»
13 years 8 months ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
SOUPS
2006
ACM
14 years 2 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden